Mitsubishi Electric MELSEC iQ-R Series
MELSEC iQ-R Safety CPUs and SIL2 Process CPUs contain vulnerabilities (CWE-200 exposure of sensitive data, CWE-522 insufficiently protected credentials, CWE-645 overly restrictive allowlist) that allow a remote attacker on the network to extract legitimate user credentials or gain unauthorized access without authentication. Successful exploitation could grant an attacker the ability to modify safety-critical logic, alter control system behavior, or deny access to legitimate operators. The vulnerabilities affect firmware version 26 or earlier on Safety CPUs and version 11 or earlier on SIL2 Process CPUs. All versions of these products are vulnerable.
- Network connectivity to the Ethernet port of the MELSEC iQ-R CPU (port unspecified in advisory)
- No valid credentials required to extract user information
- Device must be running vulnerable firmware version 26 or earlier (Safety CPU) or version 11 or earlier (SIL2 Process CPU)
/api/v1/advisories/9e5ca5b1-034d-4d68-aaa6-879d1965da1dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.